Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely
used to enhance security in various devices. In the past decade, significant progress has …
used to enhance security in various devices. In the past decade, significant progress has …
Contactless fingerprint recognition using deep learning—a systematic review
Contactless fingerprint identification systems have been introduced to address the
deficiencies of contact-based fingerprint systems. A number of studies have been reported …
deficiencies of contact-based fingerprint systems. A number of studies have been reported …
Multiscale patch-based contrast measure for small infrared target detection
Infrared (IR) small target detection plays an important role in IR guidance systems. In this
paper, a biologically inspired method called multiscale patch-based contrast measure …
paper, a biologically inspired method called multiscale patch-based contrast measure …
Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network
Digital Twin is the mirror image of any living or non-living objects. Digital Twin and Cyber-
physical system (CPS) provides a new era for industries especially in the healthcare sector …
physical system (CPS) provides a new era for industries especially in the healthcare sector …
Fingerprint liveness detection using convolutional neural networks
With the growing use of biometric authentication systems in the recent years, spoof
fingerprint detection has become increasingly important. In this paper, we use convolutional …
fingerprint detection has become increasingly important. In this paper, we use convolutional …
Continuous authentication through finger gesture interaction for smart homes using WiFi
The development of smart homes has advanced the concept of user authentication to not
only protecting user privacy but also facilitating personalized services to users. Along this …
only protecting user privacy but also facilitating personalized services to users. Along this …
Fingerprint spoof buster: Use of minutiae-centered patches
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …
user authentication, but the security of the recognition system itself can be jeopardized by …
A-Stacking and A-Bagging: Adaptive versions of ensemble learning algorithms for spoof fingerprint detection
Stacking and bagging are widely used ensemble learning approaches that make use of
multiple classifier systems. Stacking focuses on building an ensemble of heterogeneous …
multiple classifier systems. Stacking focuses on building an ensemble of heterogeneous …
An investigation of local descriptors for biometric spoofing detection
Biometric authentication systems are quite vulnerable to sophisticated spoofing attacks. To
keep a good level of security, reliable spoofing detection tools are necessary, preferably …
keep a good level of security, reliable spoofing detection tools are necessary, preferably …
Slim-ResCNN: A deep residual convolutional neural network for fingerprint liveness detection
Y Zhang, D Shi, X Zhan, D Cao, K Zhu, Z Li - IEEE Access, 2019 - ieeexplore.ieee.org
Fingerprint liveness detection has gradually been regarded as a primary countermeasure for
protecting the fingerprint recognition systems from spoof presentation attacks. The …
protecting the fingerprint recognition systems from spoof presentation attacks. The …